docker container that deals with git. This repository is also used to test the deployment of the jenkins test environment.
docker build -t git-docker .
In order to run this container you need to provide two values:
- SSH_PRIV_KEY: The private key from the git user
- The volume that contains the git repo to be used
docker run --name git-docker -d -v ${PWD}:/git -e SSH_PRIV_KEY=${SSH_PRIV_KEY} git-docker git status
The git-docker
repository contains
- a simple
docker
container, - a silly
HelloWorld.java
that uses gradle, - a silly
hello.js
that uses yarn. - a
Jenkinsfile
with four stages that tests the credentials injected at deployment time.
- Validity of
configureGithubPlugin.groovy.tpl
- Validity of
configureGithubBranchSourcePlugin.tpl
- Validity of
configureGlobalPipeline.groovy.tpl
Here we're testing that the git-docker
container can be built and pushed to our jFrog docker registry
, it also checks that the Jenkins master can spawn slaves with label 'packer'
.
- Validity of
configureEC2Plugin.groovy.tpl
- Validity of
configureDockerRegistries.groovy.tpl
Here we're testing that we can pull an image from jFrog docker regristry
and that we can access the jFrog artifact registry
to download python dependencies. It also checks that the Jenkins master can spawn slaves with label '20GB'
- Validity of
configureEC2Plugin.groovy.tpl
- Validity of
configurePyPiCreds.groovy.tpl
Here we're testing that we can access the jFrog artifact registry
to download Java dependencies. We're also testing that the Jenkins Master can spawn slaves with label 'docker-compose'
- Validity of
configureEC2Plugin.groovy.tpl
- Validity of
configureJFrogMavenRepoAccess.groovy.tpl
Here we're testing that we can access the jFrog artifact registry
to download Node.js dependencies.
- Validity of
configureNPMRegistry.groovy.tpl